Please turn on your JavaScript for this page to function normally.
Cybercriminals exploit trusted app and service vulnerabilities

The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014. McAfee Labs found that 79 percent of …

Card fraud impacts 1 in 4 consumers worldwide

A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. The study, …

Hackers to attack routers at DEF CON

A competition is scheduled for hackers and computer scientists from around the world to better protect consumers against widespread security vulnerabilities in wireless …

Dropbox-themed phishing is after multiple login credentials

Phishing emails purportedly leading users to a file hosted on Dropbox are targeting Yahoo!, Gmail, Hotmail, and Aol email users, warns Malwarebytes’ Jovi Umawing. …

Google forks OpenSSL: BoringSSL will be used in company products

Google has announced another OpenSSL fork. Dubbed BoringSSL, it will, in time, replace the OpenSSL library in various Google’s projects. “We have used a number of …

Key Internet of Things privacy and security issues

Independently administered throughout 11 countries, a new Fortinet survey gives a global perspective about the Internet of Things, what security and privacy issues are in …

Spammers increasingly targeting Montreal

AdaptiveMobile released data that shows a marked increase in SMS spam across Canada in the past six months. The higher volume of SMS spam comes on the eve of the July 1st …

Quarter of all UK attacks target web services and applications

A comprehensive analysis of security alerts in 2013 reveals that a quarter of all attacks in the UK were application specific attacks or targeted at web applications. This is …

Cisco releases source code for experimental block cipher

A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for …

Week in review: GCHQ intercepts Google, Facebook users’ communications, Code Spaces destroyed by extortion hack attack

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here …

Critical flaw exposes admin passwords of nearly 32,000 servers

Over 30,000 servers with Supermicro baseboard management controllers (BMCs) on their motherboards are offering up administrator passwords to anyone who knowns where to look, …

TrueCrypt developer says forking the software is impossible

Even though a number of people have expressed interest in continuing the development of TrueCrypt, the future of these projects is questionable as one of the TrueCrypt …

Don't miss

Cybersecurity news